The Transit Secrets Engine provides the ability to generate a high-entropy data key to support cryptographic operations locally. The premise is to support crypto services without routing the payload to Vault. The generation of the high-entropy key relies on an existing Transit endpoint that supports a named key.
The motivation for this exercise is to demonstrate practical, simplified examples of how to use an external, high-entropy data key generated with the Vault Transit Secrets Engine. There is a distinction in using Transit backends for Encryption-as-a-Service versus client-side or server-side crypto operations. The instrumentation of Transit provides consumers with a unique key to fulfill operations on-demand outside of the Vault continuum.
The following instructions are here to help the practitioner explore the use case for an external data key, and to test encryption and decryption methods. If you are more interested in a general description, please see the Encryption Patterns first.
The main assets to consider in this exercise are:
-
e_aes_mode_cbc: Standalone encryption module that uses a Transit data key. This example applies AES.MODE_CBC encrytion and generates metadata. The
e
stands forencryption
. -
d_aes_mode_cbc: Standalone decryption module that retreives a Transit data key derived from the metadata information (created by the encryption module). The
d
stands fordecryption
. -
vault_client_lib: A Python utility that connects to and authenticates with a Vault instance. This library uses the HVAC API client for Vault. This asset requires four environment variables as follows:
-
VAULT_ADDR: The network location of Vault. It is expressed as a URL like
http://127.0.0.1:8200
. -
VAULT_TOKEN: The main authentication credential to access Vault. This is used as an authentication method to validate the identity of the consumer.
-
VAULT_TRANSIT_KEYRING: The label of the named key in the Transit secrets engine. In our examples, we use
app-01
but this can be expressed to reflect any other conditions. -
VAULT_MOUNTPOINT: The typical default for the Transit Secrets Engine is
transit
. However, it is possible to enable multiple Transit endpoints and this option allows for additional entry points.
-
- Establish the initial Transit mount point as
transit
- Assume that we label the keyring as
app-01
- Our Vault instance is running locally
We express the environment variables in Bash as follows:
export VAULT_MOUNTPOINT='transit'
export VAULT_TRANSIT_KEYRING='app-01'
export VAULT_ADDR='http://127.0.0.1:8200'
- If using a clean development instance of Vault, you can run Vault as follows:
vault server -dev -dev-root-token-id="root"
The response will generate a message similar to the following:
WARNING! dev mode is enabled! In this mode, Vault runs entirely in-memory
and starts unsealed with a single unseal key. The root token is already
authenticated to the CLI, so you can immediately begin using Vault.
You may need to set the following environment variable:
$ export VAULT_ADDR='http://127.0.0.1:8200'
The unseal key and root token are displayed below in case you want to
seal/unseal the Vault or re-authenticate.
Unseal Key: 5O/1jtqUdmbytl+jNa9UNaTOxvbwtdFPhH0fX0m8FG4=
Root Token: root
Development mode should NOT be used in production installations!
- If necessary, you can unseal Vault with the command below. Normally, Vault is automatically unsealed when running in
dev
mode.
vault operator unseal
- If necessary, log into Vault as the root user. The password is
root
.
vault login
Token (will be hidden):
Success! You are now authenticated. The token information displayed below
is already stored in the token helper. You do NOT need to run "vault login"
again. Future Vault requests will automatically use this token.
Key Value
--- -----
token root
token_accessor Dd0yobC3qaJ5yoEsGuEsJrLm
token_duration ∞
token_renewable false
token_policies ["root"]
identity_policies []
policies ["root"]
- Enable the Transit Secrets Engine
vault secrets enable -path=$VAULT_MOUNTPOINT transit
- In your Transit mount point, create a key ring labelled
app-01
. The Transit mount point is already declared in the environment variable$VAULT_MOUNTPOINT
. And, the keyring label is also expressed as an environment variable with$VAULT_TRANSIT_KEYRING
.
vault write -f $VAULT_MOUNTPOINT/keys/$VAULT_TRANSIT_KEYRING
- Create a basic access policy related to the expected Transit path
cat << EOF > $VAULT_TRANSIT_KEYRING.hcl
path "$VAULT_MOUNTPOINT/encrypt/$VAULT_TRANSIT_KEYRING" {
capabilities = [ "update" ]
}
path "$VAULT_MOUNTPOINT/decrypt/$VAULT_TRANSIT_KEYRING" {
capabilities = [ "update" ]
}
path "$VAULT_MOUNTPOINT/datakey/plaintext/$VAULT_TRANSIT_KEYRING" {
capabilities = [ "update" ]
}
EOF
- Create a policy for
app-01
vault policy write $VAULT_TRANSIT_KEYRING $VAULT_TRANSIT_KEYRING.hcl
- Generate a working Vault token that is applicable to the policy
vault token create -policy=$VAULT_TRANSIT_KEYRING
The response from the token create
directive above includes a bearer token. For testing purposes, the token acts as the authentication vehicle for the consumer. In real life, there are more sophisticated authentication techniques that may require different instrumentation.
Key Value
--- -----
token s.dHIi7Wf1dU2paz8GVnuc1UQO
token_accessor eJI7ogIBOkHaVkgVFcs2Ffeo
token_duration 768h
token_renewable true
token_policies ["app-01" "default"]
identity_policies []
policies ["app-01" "default"]
- Express the environment variable for the given Vault token:
export VAULT_TOKEN='s.dHIi7Wf1dU2paz8GVnuc1UQO'
Once the environment and Vault are configured, we can use the coded examples to illustrate scenarios.
A note about functional vs working code: These examples help describe working conditions but are not ready for production roles. The breakdown is functional to support different crypto operations. In real life, these code snippets should be refactored, curated, or fully rewritten.
You can test the instrumentation by running the vault_client_lib utility which makes three requests from Vault:
-
In this mode of operation, the utility authenticates with Vault instance using the token expressed with $VAULT_TOKEN. It targets the Vault instance identified with $VAULT_ADDR.
-
The utility then requests a new Transit data key using the Transit mount point expressed with $TRANSIT_MOUNTPOINT and Transit key ring exposed with $VAULT_TRANSIT_KEYRING environment variables.
-
With the
ciphertext
received, the utility decrypts the originalplaintext
key.
python3 source/vault_client_lib.py
Data key request:
{ 'auth': None,
'data': { 'ciphertext': 'vault:v1:9qZYd98tDCDCg/aB9/cgyjPN+fC4Rw6+FMh03aVirInhJIa0xZ8OvTNmPyEJ1j8aK1o+hul4Jb/FoA65',
'key_version': 1,
'plaintext': 'OaRF5IMUHnFtIWMxWVnzIdMpasKLviapy9g37vfnSto='},
'lease_duration': 0,
'lease_id': '',
'renewable': False,
'request_id': '35cdeaa2-37c4-e912-c657-79d58b131711',
'warnings': None,
'wrap_info': None}
Data key recall:
{ 'auth': None,
'data': {'plaintext': 'OaRF5IMUHnFtIWMxWVnzIdMpasKLviapy9g37vfnSto='},
'lease_duration': 0,
'lease_id': '',
'renewable': False,
'request_id': '9a71b1a4-dca4-6bbb-e7a1-c193441accec',
'warnings': None,
'wrap_info': None}
With a successful test of the basic instrumentation, it is possible to try out the encryption and decryption modules.
The command to encrypt new data is as follows:
python3 e_aes_mode_cbc.py <path-to-target-file>
Using our sample data in Account-Information-Form.pdf, we can use the following command:
python3 source/e_aes_mode_cbc.py sample_data/pdf/Account-Information-Form.pdf
The encryption module produces two files:
- Account-Information-Form.pdf.aes.mode_cbc is the encrypted payload.
- Account-Information-Form.pdf.aes.mode_cbc.json contains the metadata associated with the encrypted payload.
To decrypt data, the decryption module references an encrypted file by name. The module tries to find a corresponding JSON file that contains metadata. The command to decrypt existing data is as follows:
python3 d_aes_mode_cbc.py <path-to-target-file>
From the example above, assume that a local directory hosts an encrypted file and its corresponding metadata:
tree
.
├── Account-Information-Form.pdf.aes.mode_cbc
└── Account-Information-Form.pdf.aes.mode_cbc.json
The decryption command runs as follows:
python3 source/d_aes_mode_cbc.py sample_data/pdf/Account-Information-Form.pdf.aes.mode_cbc
The module does the following:
- Reads the initialization vector (
iv
) used during the encryption which is saved in the medatadata. - Uses the
ciphertext
and connects to Vault to derive the original encryption key. - Creates a new unencrypted file without the
aes.mode_cbc
extension.
In the new set of files, a new unencrypted file should be present.
tree
.
├── Account-Information-Form.pdf
├── Account-Information-Form.pdf.aes.mode_cbc
└── Account-Information-Form.pdf.aes.mode_cbc.json
Once we are able to demonstrate these procedures, we can focus on what on the essential background concepts that affect a larger enterprise. If necessary, there are additional sample data assets sample data assets included in this repo that can be safely used to run additional tests.
Any consumer that interacts with Vault requires authentication. The basic premise is to use Vault to broker the consumer's identity against many authentication engines. Vault maintains a relationship using a role that matches a privileged role within the target identity and authentication engine.
In the illustration below, the consumer uses an LDAP account to authenticate with Vault—the Vault LDAP Authentication engine aligns with the corporate LDAP Engine to verify and confirm the identity.
For example, we use the Vault CLI to authenticate directly with Vault. Other methods are less involved and more automatic, and this example illustrates the implicit need to vet the consumers' identity.
vault login -method=ldap username=bender
Password (will be hidden):
Successfully authenticated! The policies that are associated
with this token are listed below:
default, app-01
Once the consumer's identity is validated, Vault links internal access policies that describe the capabilities expressed for the consumer. Polices align with Vault users and Vault groups that reflect a hierarchical structure for the consumer's environment.
From the diagram, Application 01 can be an individual component managed by a unique identity. Or, Application 01 is part of a group of resources governed by a shared identity. In either case, the linked policies describe the authorization to the secrets engine for the consumer and its identity.
In this scenario, a policy describes the encryption and decryption capabilities as follows:
# app-01.hcl
path "transit/encrypt/app-01" {
capabilities = [ "update" ]
}
path "transit/decrypt/app-01" {
capabilities = [ "update" ]
}
Vault successfully validates the consumers' identity and returns a payload that includes a bearer token. The consumer uses the token to access the secrets engine with the capabilities expressed in the policy. The metadata also describes any additional policies linked to the token authorize the capabilities that the consumer can apply. The significance is the alignment with the desired policy, which allows the consumer to access the resources described by the policy app-01.
For the authenticated user, interacting directly with the Vault CLI, a bearer token allows for direct access to the secrets engine.
Key Value
--- -----
token s.dHIi7Wf1dU2paz8GVnuc1UQO
token_accessor eJI7ogIBOkHaVkgVFcs2Ffeo
token_duration 768h
token_renewable true
token_policies ["app-01" "default"]
identity_policies []
policies ["app-01" "default"]
In general encryption-as-a-service practices, the expectation is that a service consumer routes the payload through the Transit Secrets Engine, receiving an encrypted blob in return. The service consumer is then responsible for storing the content in a desired endpoint with the encrypted material.
To illustrate with an example, assume a named key to support encryption services of documents. The endpoint app-01 is configured with an AES-GCM with 256-bit AES and 96-bit nonce mode operations and is used to support encryption, decryption, key derivation, and convergent encryption.
In this context, the consumer routes a data blob through the encryption endpoint, and the secrets engine returns a response object that includes encrypted data. The consumer is responsible for safely storing the encrypted data on an appropriate storage medium.
Using the Vault CLI, the inline encryption operation requires passing the desired data encoded in the base64 scheme.
vault write transit/encrypt/app-01 \
plaintext=$(base64 <<< "4024-0071-7958-8446")
The returning payload object includes the corresponding encrypted ciphertext. The consumer is then responsible for storing the payload for future reference.
Key Value
--- -----
ciphertext vault:v1:DFA010gVDW5ks6S5hQIjbRjuIhEXSnLm9gjYhRPqd+rZEdShzkXG0zb9kadL35g=
key_version 1
For completeness, it is relevant to explain that the decryption procedure follows a similar pattern. With the successful authentication of the consumer, the policy allows for decryption services. The consumer then routes the ciphertext through Vault to obtain unencrypted data.
vault write transit/decrypt/app-01 \
ciphertext="vault:v1:DFA010gVDW5ks6S5hQIjbRjuIhEXSnLm9gjYhRPqd+rZEdShzkXG0zb9kadL35g="
Key Value
--- -----
plaintext NDAyNC0wMDcxLTc5NTgtODQ0Ng==
The data produced is encoded in the base64 scheme and requires decoding.
base64 --decode <<< "NDAyNC0wMDcxLTc5NTgtODQ0Ng=="
4024-0071-7958-8446
In the end, the consumer can extract the original data payload and present it to the next operation.
There are situations in which routing data through the Transit Secrets Engine is not ideal. There can be multiple reasons, but the most common are:
- The payload is too large to transfer over the network when data blobs are about two Gigabytes in size or more.
- The operation must be completed locally on a document or abstract object, not on a single string of data.
The first step is to update the appropriate capabilities to the consumer's policy. This ensures that the consumer can generate a new high-entropy key and value using app-01 as the encryption key.
# app-01.hcl
path "transit/encrypt/app-01" {
capabilities = [ "update" ]
}
path "transit/decrypt/app-01" {
capabilities = [ "update" ]
}
path "transit/datakey/plaintext/app-01" {
capabilities = [ "update" ]
}
In a routine operation, the consumer can generate a request which responds with ciphertext
and plaintext
values.
vault write -f transit/datakey/plaintext/app-01
Key Value
--- -----
ciphertext vault:v1:q98ntBqvUL+x1/8IF2hb4/V2nw/OAezbS7K+q5PPYg6d+SF4HAm1cbJwDlt/YUg4GD9jv6SD60imhf9/
key_version 1
plaintext 18rTYrIjBGejLvptBTpcbnE7k1U29lOFys1OwW2S1yQ=
The ciphertext returned reflects the encrypted value of the plaintext. The ciphertext is used to recall the data key when needed. The consumer must preserve the ciphertext and the relationship to the data file or data object involved in the encryption or decryption operations.
The plaintext is a bytes object of a named data key. The bytes object can be 128, 256 or 256 bits in length, and it is encoded in the base64 scheme. Once unwrapped, the consumer uses this object to create a block cipher
. The cipher must be combined with a mode of operation to support symmetric or asymmetric encryption MODES.
In the example for encryption operations, we reference Advanced Encryption Standard (AES) MODE Cipher-Block Chaining (CBC). Depending on the implementation library used for this operation, there can be additional parameters to fulfill. For instance, with Python tests, the AES.MODE_CBC requires an initialization vector (iv) parameter that is unique to the operation. Hence, it also needs to be documented in the metadata for future reference.
There are multiple techniques to accomplish the work. For illustration purposes, we save the metadata externally in a JSON object for future reference. In other situations, the data is added to the encrypted payload, and positional information is written in the header of the encrypted object itself.
Lastly, for every encryption function, there must be a decryption function. And, in every situation, a newly created cipher must use a key to perform the assigned task. For encryption operations, the key is generated directly from the Transit Secrets Engine. Once the procedure completes, the key is discarded, and the corresponding ciphertext is saved. The ciphertext also needs to have a relational link to the object used in the encryption process.
When the consumer decrypts an encrypted object, it uses the ciphertext to unencrypt the original data using the app-01 encryption key. With the original data key reproduced, a cipher is used to decrypt the encrypted object.